Delivering Application-Layer Traffic Optimization Services based on Public Routing Data at Internet exchange Points

Size: px
Start display at page:

Download "Delivering Application-Layer Traffic Optimization Services based on Public Routing Data at Internet exchange Points"

Transcription

1 Delivering Application-Layer Traffic Optimization Services based on Public Routing Data at Internet exchange Points Danny Alex Lachos Perez 1, Samuel Henrique Bucke Brito 1, Ramon dos Reis Fontes 1, Christian Esteve Rothenberg 1 1 Universidade Estadual de Campinas (UNICAMP) Faculdade de Engenharia Elétrica e de Computação (FEEC) Information & Networking Technologies Research & Innovation Group (INTRIG) Av Albert Einstein, 400, Cidade Universitária Zeferino Vaz, Campinas, SP, Brasil {dlachosp,shbbrito,ramonrf,chesteve}@dca.fee.unicamp.br Abstract. Application-Layer Traffic Optimization (ALTO) is a recently standardized protocol that provides abstract network topology and cost maps in addition to endpoint information services that can be consumed by applications in order to become network-aware and take optimized decisions regarding traffic flows. In this paper, we propose a public service based on the ALTO specification using public routing information available at the Brazilian Internet exchange Points (IXPs). Our ALTO server prototype takes the acronym of AaaS (ALTO-as-a-Service) and is based on over 2.5GB of real BGP data from the 25 Brazilian IX.br public IXPs. We evaluate our proposal in terms of functional behaviour and performance via proof of concept experiments which point to the potential benefits of applications being able to take smart endpoint selection decisions when consuming the developer-friendly ALTO APIs. 1. Introduction Internet applications like file sharing, real-time communications and those served from Content Delivery Networks (CDNs) rely on some sort of network topology and cost/performance information to select the best nodes in order to optimize the data transfer. Each application, however, uses different means to build such overlay maps without taking into account underlying network topology considerations or network operator insights. Thus, the application endpoint selection is commonly performed based on partial and inaccurate network views or even randomly in some cases, impacting both the application performance and efficient use of the networking infrastructure [Seedorf and Burger 2009]. Aiming to fill this gap, the Application-Layer Traffic Optimization (ALTO) protocol [Alimi et al. 2014] was designed to allow network operators to provide abstract network information to Internet applications, which can consume this useful information to optimize their connectivity decisions in alignment with the network operators cost interests and traffic engineering practices. The network information is conveyed in the form of abstract Map Services (Network Map and Cost Map) by an ALTO server (see Fig. 1). A Network Map divides all endpoints (e.g., IPv4/IPv6 addresses or prefixes) in Provider- Defined Identifiers (PIDs) and a Cost Map provides the cost between each pair of PIDs so that it is possible to have a ranking of priority or preference among any pair of endpoints.

2 Figure 1. Concept of ALTO and two main services: Network Map and Cost Map. Most of ALTO implementations today are created by Internet Service Providers (ISPs) based on their individual knowledge of their network dynamics and the costs associated with peering and transit links [Gurbani et al. 2014]. However, recent efforts [Gurbani et al. 2014] show that third parties (not associated with ISPs) can also create valuable Network and Cost Maps from public information. In this work, we propose a public service called ALTO-as-a-Service (AaaS) that leverages the routing information openly available at Internet exchange Points (IXPs). Different from related work such as [Madhukar and Williamson 2006] that provides ALTO services through the use of ISP s policies (not available to outside parties), AaaS creates an operator-neutral and public ALTO services based on the BGP routing data from public IXPs operating in Brazil by the IX.br project [Brito et al. 2015]. The raw BGP data is converted into ALTO information, and then stored in a Graph Database (GDB) to be then delivered to ALTO clients through an ALTO server via RESTFul APIs. In order to define the Network Map, each Autonomous System Number (ASN) represents a PID and every prefix (IPv4/IPv6) advertised by an AS correspond to an endpoint. Based on this Network Map, we create different Cost Maps based on the physical or the AS-level topological distance between each pair of ASes. We evaluate AaaS regarding its functional behaviour (i.e. compliance to the ALTO protocol specifications) and performance profile of our proof of concept prototype implementation based on the OpenDaylight network controller.in addition, we run a series of experiments using a Mininet topology that reflects the BGP-based AS-level connectivity in order to validate the concept and show the potential benefits of applications using the abstract network information from the IXP routing views easily consumable through developers-friendly ALTO APIs. The remainder of this paper is structured as follows. Section 2 provides an overview of ALTO and includes a primer on IXPs. Section 3 presents the proposed architecture (AaaS) along the basic workflow. Then, the prototype implementation based on BGP data from IX.br is described in Section 4. Section 5 validates the proof of concept with three different experiments (functional, performance, and use case scenario). Section 6 and 7 describe, respectively, current limitations and related work of our research. Finally, we conclude the paper in Section 8 and point to our future work. 2. Background 2.1. ALTO Protocol Application-Layer Traffic Optimization (ALTO) [Alimi et al. 2014] is a recently Internet Engineering Task Force (IETF) standardized protocol (RFC 7285) with the main goal of exposing network information so that the applications can optimize their endpoint selec-

3 tions and make informed decisions on questions such as: provided a source IP src, which IP dst endpoints are the best 1 among n candidate destinations. At a high level, ALTO is an information-publishing interface that fills the gap between networks and applications by allowing network operators to publicly expose abstract network information. This network-to-application information flow benefits both the network providers (i.e. ALTO information providers), who obtain better utilization of their networking infrastructure provided applications base their endpoint decisions following the ALTO cost maps and the applications (ALTO information consumers), which do not need to reverse engineer the network and each of them build their own topology maps and endpoint performance rankings. As shown in the ALTO architecture illustrated in Figure 2(a), an ALTO server gathers network information from multiple sources, such as routing protocols, dynamic and static network information, external interfaces, and so on. These input information is then used to generate an abstract and unified view of the network in the ALTO server, that, in turn, responds to ALTO client requests. The ALTO protocol is based on existing HTTP implementations such as RESTful interfaces for client-server interaction and JSON for request/reply encoding. ALTO Information Services (Fig. 2(b)) include two main services (Map Service: Network Map and Cost Map) and three additional ones: Network Map: represents a grouping of endpoints into PIDs (Provider-defined Identifier) that may be handled similarly based on its type, topological, physical proximity, or any other criteria. It is responsibility of the ALTO server provider to decide on the grouping of endpoints and the definition and semantics of PIDs. Cost Map: represents an abstract cost metric (absolute or relative) between any pair of PIDs in the form of path costs. The path cost is a custom-made cost defined and internally computed by the ALTO server implementation. Map-filtering Service: responsible to filter the result of queries on the Network Map and/or Cost Map to narrow the reply to a subset of PIDs specified by the ALTO client. Endpoint Property Service (EPS): provides ALTO clients with information about endpoint properties (e.g. which PID belongs a particular endpoint). Endpoint Cost Service (ECS): unlike the Cost Map (costs between PIDs), it provides information about costs between individual endpoints Internet exchange Point An IXP is a shared physical network infrastructure regionally installed with the purpose to facilitate the exchange of Internet traffic between ASes With the traffic exchange as local as possible between different networks that belong to the same region, the number of hops between ASes and dependency on transit providers is reduced. Brazilian IXPs [Brito et al. 2015] are part of the IX.br project 2, which was created to promote the infrastructure and operational means to increase the connectivity between AS networks of Brazilian metropolitan regions interesting in fostering local Internet traffic exchange. Currently, featuring 25 IXPs in operation, IX.br is the largest IXP ecosystem in 1 The best according to some cost metric defined by the ALTO server provider 2

4 (a) Figure 2. ALTO (a) Architecture (b) Information Service. Adapted from RFC (b) Latin America and it is among the world s top ten both in number of members (1300+) 3 and maximum throughput rate (above 1 Tbps) 4. The business model in most cases, including Brazil adopted by an IXP is open (multilateral peering), commonly allowing anyone to access a large amount of BGP public information through telnet connections to Looking Glass (LG) servers. IP control plane information such as the BGP routing tables, the list of BGP AS-PATH, the community codes, etc., can be retrieved, and by accessing the LGs. This open access to the public routing information is the main input to build the ALTO maps proposed in our work. 3. Design of ALTO-as-a-Service We propose to deliver ALTO as a public service useful to any application interested in information about AS-level network maps for IP endpoints. The main goal is to generate ALTO PIDs (Network Map) along a ranking of candidate PIDs (Cost Map) using the publicly available BGP routing information at IXPs. To this end, we collect BGP tables (IPv4 and IPv6) and parse the BGP AS-PATH attributes to create the ALTO Network Map and Cost Map respectively. The resulting data structures are stored in a graph-based database (Neo4j) and finally delivered as ALTO services through HTTP Rest APIs. Figure 3 illustrates the AaaS workflow: (a) Acquiring Input Data, (b) Building Graph Data Models, (c) Creating ALTO Information, and (d) Delivering ALTO Services to serve ALTO client requests. Examples of ALTO clients include, but are not limited to, (1) host running a peer-to-peer file sharing application, (2) tracker in peer-to-peer filesharing applications, or (3) Software Defined Networking (SDN) controllers. a) Acquiring Input Data. This first step is to collect BGP routing data publicly available through telnet access to LG servers, using the same methodology proposed in our IX.br ecosystem anatomy [Brito et al. 2015]. The BGP raw data is then pre-processed (formatting, filtering, and assembling) to facilitate its transformation into ALTO data structures. b) Building Graph Data Models. This process consists of building a suitable connected graph of nodes and relationships to model the ALTO information according to the protocol specification [RFC 7285]. We opt for a property graph 5 since it provides a natural modeling approach to inherent native graph problem at hand. In addition, this approach 3 Accessed: September, Accessed: September, A graph where (i) vertices and edges can have any number of key/value properties, (ii) there can be many types of relationships between vertices and (iii) edges have a directionality.

5 Table 1. Nodes and its properties in our graph data model. Name Properties Description PID Name Name of a PID EndPointAddress Prefix IP address and the length of the mask AddressType Type ipv4 or ipv6 VersionTag ResourceID ID unique for a resource (e.g. a Network Map) Tag Version for a resource Table 2. Relationships and pairs of nodes that connect them. Name Start Node End Node Description Has PID VersionTag PID Version to which a PID belongs Has EndPoint PID EndPointAddress For grouping Endpoints to a PID Type EndPoint AddressType EndPointAddress To know the Endpoint type (IPv4/IPv6) Cost PID PID Path cost between two PIDs eases the implementation of this model using a Graph DB (Neo4j) as we detail in the following section. Figure 4 provides an overview of the components used in the graph, where nodes are entities that are connected by describing their interactions, i.e. the relationships. Table 1 provides more detailed information about the graph nodes and their properties. Information about the relationships can be found in Table 2. Noteworthy is the relationship labeled as Cost, where properties can be included to create different path costs between PIDs resulting in different Cost Maps. c) Creating ALTO Information. After having the input dataset and the data model ready, the next step is to create the ALTO information and populate the graph DB. In this step, the ALTO server administrator uses the BGP routing information retrieved to create (i) grouping of prefixes into PID (Network Map) by ASes, IXPs, BGP communities, points or presence, just to cite a few examples; and (ii) defining the preferences / costs between the groups PID (Cost Map) expressed on a path cost such as physical distance between IXPs, topological distances between ASes, etc. d) Delivering ALTO Services. The last step is deploying an ALTO web server implementing the client-server protocol delivering the REST/JSON APIs to ALTO clients as defined by RFC7285. Internal interfaces to retrieve ALTO information from the GDB are also necessary and we opt to converge on REST/JSON for convenience. Figure 3. AaaS PoC Workflow

6 Figure 4. Neo4j Graph Data Model based on RFC 7285 [Alimi et al. 2014] 4. Prototype We now turn our attention to the implementation choices and prototype details of the AaaS proof of concept. In this section, we provide further details on the BGP data set from the Brazilian IXPs, the Neo4j 6 graph-based database used as the back-end for the ALTO information, and the OpenDaylight 7 (ODL) controller used as ALTO server Input: IX.br BGP Data Set The data collection methods based on LG remote access to each public IXP in Brazil are those described in [Brito et al. 2015]. More specifically, the dataset (approx. 2.5GB) retrieved during December 2014 was used for our prototype implementation. For data sharing and reproducibility purposes, the raw dataset (including all our 2015 snapshots) and all supporting code are publicly available in our research group repositories. 8 For the pre-processing job of the raw data, we use a number of Java and R 9 based algorithms. For example, with R we convert the files of IPv4 and IPv6 BGP table into a readable format and exclude prefixes that are advertised by more than 2 ASes. 10 Using Java-based algorithms, we discard the AS-Paths (from the files of the summary list of BGP AS-PATH) which contain the ASN and ASN because they are reserved for the IX.br s LG and RS respectively and, therefore, do not participate in Internet routing. Table 3 shows the number of ASes and the number of IPv4 and IPv6 prefixes before and after the pre-processing. As we can see, the amount of discarded data is not significant ALTO Server Backend: Neo4j As anticipated during the design discussion on the graph modeling approach, using a Graph Database (GDB) is a natural choice to realize the model and embody the ALTO information as a property graph. Furthermore, the ALTO protocol uses a key-value store abstraction for JSON object coding that is very amenable for the Neo4j implementation choice. Neo4j is an open-source non-relational GDB implemented in Java, highly scalable and flexible. It supports true ACID transactions, high availability, and scales to billions ALTO protocol uses the longest-prefix matching algorithm to compute the mapping from Endpoints to PIDs, therefore a Network Map must not define two or more PIDs that contain an identical Endpoint.

7 Table 3. Number of ASes and Prefixes (IPv4/IPv6) before and after the dataset pre-processing task at Brazilian IXPs. Raw Data After Proc. % Out 99% CL ±1 MOE ASes 49,586 48, % 12,460 IPv4 Prefixes 563, , % 16,163 IPv6 Prefixes 21,666 21, % 9,412 of nodes and relationships [Neo4j 2015]. In addition, application development is highly facilitated through using high-speed traversal query languages such as Cypher. As shown in Figure 5, to populate the Neo4j GDB, Java-based programs were developed to (i) read the input dataset, (ii) create the Network and Cost Map, and (iii) store the final property graphs into Neo4j using REST interfaces. Next we detail (a) how the endpoints are grouped into PIDs to create the Network Map, and (b) how the path cost between PIDs is computed to create the Cost Map: a) Network Map. For each pre-processed IPv4 and IPv6 BGP table, the developed algorithm reads each route announcement entry and extracts the ASN (Autonomous System Number) that originated/advertised a prefix. The ASN serves as the PID (location) grouping resulting in a total of 48,962 PIDs (consistent with the current global amount Internet AS). Next, each prefix (be it IPv4 or IPv6) is associated with a particular PID (i.e., AS) considering the origin of the prefix announcement. b) Cost Map. The path cost between PIDs is calculated as the AS-level topological distance corresponding to the amount of traversing ASes, i.e. path cost equals the number of AS hops between a source and destination AS. A lower cost between PIDs indicates a higher preference for traffic. Two Cost Maps variations are proposed: one which represents the absolute topological distance, and a second one which represents the relative distance. In the latter case, hops between ASes present in the same IXPs are zeroed to favor intra-ixp traffic. The AS-Path summary files are used to create these maps (see Fig. 5, Cost Map). First, we build the AS-level connectivity graph using an auxiliary GDB. Then, we compute the path cost between each pair of ASes using Cypher queries. Whenever more than one path between two ASes is found, the path with the least number of traversing ASes is chosen. Finally, the path cost is updated in the main ALTO GDB instance. The Cost Map is a square matrix of order N where N corresponds to the number of PIDs resulting in over 2.3 billion (10 9 ) relationships labeled as cost (two properties are used to distinguish between the absolute and relative distance). Hence, the process of Cost Map creation is partially completed in a proactive manner, while the remainder of the map is created on the fly (or reactively) based on ALTO client requests asking for path cost between specific PIDs ALTO Server Front-End: OpenDaylight In order to deliver ALTO services, we opt to reuse the OpenDaylight (ODL) controller that features an ALTO project 11 since the Lithium software release. ODL is an open 11

8 source SDN controller architecture with production quality code and proven scalable and reliability. The initial release of ALTO in ODL includes, among other modules, ALTO Northbound providing basic ALTO services as RESTful web services (Northbound APIs) for ALTO client/server communications. ALTO Northbound APIs generate ALTO services from data stored in the MD-SAL data store (an ODL core component). For our AaaS implementation, it was necessary to modify the Northbound APIs to generate ALTO services from the data stored in the Neo4j GDB (instead of the MD-SAL topology). We checkout the stable/lithium branch in the ALTO project GitHub repository, 12 which implements the following ALTO services: (i) full Map Service, (ii) Map-Filtering Service, (iii) Endpoint Property Service, and (iv) Endpoint Cost Service. To accomplish our proof of concept evaluations, our initial ALTO server delivers the Map-Filtering Service, i.e. the filtered Network Map and the filtered Cost Map, which allow ALTO clients to specify filtering criteria to return only a subset of the full Map Service. Hence, those two Northbound APIs were modified so that the ALTO server retrieves information from the Neo4j backend and converts into the ALTO format specification. All RESTFul API modifications are available in our public repository. 5. Experimental Evaluation We evaluate our proposal by carrying three different types of experiments using the proof of concept AaaS implementation: 13 (1) functional behaviour (i.e. conformance to ALTO spec.), (2) system performance profiling, (3) emulated IXP use case scenario. Despite using real BGP data, the use case experiments are arguably simplified and mainly serve as a strawman to illustrate the potential of ALTO to deliver useful services to IXP members (and/or third-party applications) to perform better-than-random peer selection Functional Evaluation We evaluated whether the ALTO server delivers ALTO services in compliance to RFC For that, we used a REST client tool 14 to retrieve ALTO information in JSON format by communicating with the ALTO server via HTTP request. As discussed in Single server configuration: Intel R Core TM 3.60GHz x 8 with 16GB RAM, running Ubuntu 14.04LTS (Linux) 64-bit Figure 5. Map Service grouped by AS

9 the previous section, two RESTful web services are available. An example of the URI, HTTP Method, Content Type, Input Parameters and JSON Response for both the filtered Network Map and the filtered Cost Map (absolute distance) can be seen in Figure 6. To obtain the relative distance, HopsNumberPTT instead of HopsNumber is used as the input Cost-metric parameter. As expected, our AaaS prototype delivers the ALTO services in accordance with the ALTO specifications and fully reflects the ALTO information stored in Neo4j. (a) Filtered Network Map (b) Filtered Cost Map (absolute distance) Figure 6. HTTP request and JSON response messages to the filtered Network and Cost Map services System Performance Profiling In order to assess the performance of our AaaS prototype, we calculate the response time for the filtered Network and Cost Map (absolute distance) services. For both services, between 1 to 100 PIDs 15 are randomly selected, totaling 100 requests where each request is executed 10 times. The average transaction time is shown in Figure 7. For the Network Map service, we can observe that the response time increases in proportion to the number of PIDs (See Fig. 7(a), Network Map). For example, when the number of PIDs is 5 and 50, the average time was 0.19 Sec and 1.45 Sec, respectively. Regarding the Cost Map service, we have two PID input parameters (see Fig. 6(b)). A single PID is used as source PID (srcs parameter) and the amount of destination PIDs (dsts parameter) varies from 1 to 100. Another relevant factor in the response time is whether a proactive or reactive mode is evaluated. In order to evaluate the proactive approach, we select a source PID with all possible path costs already created (about 49K path costs). As shown in Figure 7(a), on average, the processing time is 19.73% (or 0.24 Sec) slower compared to the Network Map service. We have a higher query cost, as there are two access operations to the database: one to retrieve the source PID and one to retrieve the path cost with destination 15 With 50 being the default number of candidate peers in the BitTorrent P2P application.

10 3.5 3 Network Map Cost Map (Proactive) Cost Map (Reactive) Cost Map Extra time (Proact) Cost Map Extra time (React) 2.5 Response time (sec) Response time (sec) Number of PIDs Number of PIDs (a) (b) Figure 7. (a) Response processing time for the Network and Cost Map (Absolute Distance) services and (b) processing time used to compute two additional steps (the number of hops and insert it into database). PIDs. It is also necessary to point out that this mode does not have to spend time, i.e. 0 Sec (see Fig. 7(b), Proact) to compute two additional steps (the number of hops and insert them into the database), as they were previously processed. In the reactive mode, although it also has two access operations, the average processing time is just 0.07 Sec (see Fig. 7(a), React). This behavior can be explained by the fact that the path costs are only created for destinations PIDs of the HTTP request, namely, up to a maximum of 100 path costs. However, for the first request, the time it takes to execute the two additional steps must be considered; for instance, when we send 10 destination PIDs, the processing time is around 2.3 Sec (see Fig. 7(b), React). A particular case is when 62 and 92 destination PIDs are sent, we can see that it takes almost 0 Sec. This is because the selected destination PIDs already had the path cost created with the source PID, so no additional steps were needed. Eventually, when all possible path costs for a particular PID are already created, the response, the time should be in proportional to the number of destination PIDs, as shown in a proactive manner. Finally, the latency for obtained a response from AaaS can be eased either re-using cached Maps (at the risks of being out-of-date) or running servers in multiple domains through delegation of some ALTO information (e.g. Filtered Network and Cost Maps) to other subdomains Use Case Scenario We now try to assess the potential effectiveness of AaaS in delivers useful network information be so that an originating peer can make better decisions (in terms of network performance) regarding the candidate destination peers. Experimental Setup. The network model used is based on a small IXP ecosystem (see Fig. 8) consisting of 22 ASes, each represented by a switch abstraction in the Mininet emulator. A sample AS-Path summary file based on real BGP data was used to create the AS-level connectivity in our experiment topology. 16 The large AS switch represents the 16 Another noteworthy contribution of our work is the Python-based code developed to generate ASlevel topologies for Mininet based on BGP data. The topologies can be used to emulate IXP ecosystems

11 Figure 8. The IXP-based testing network model and the Cost Map rankings based on the absolute and relative distance between ASes. IXP and then 10 communicating peers are represented as Mininet hosts attached to the (AS abstraction) switches. Links between ASes follow the sample AS-Path attributes and were set with larger bandwidth and lower delay when closer to the IXP. In the case of ALTO information, the same AS-Path Summary file is used in order to build two Cost Maps based on the topological distance (absolute and relative) expressed as the number of hops between ASes (Fig. 8, Cost Map Rankings). Hosts that belong to ASes present at the IXP (ie., h1, h2, h3) were defined as ALTO clients, since the BGP data (and topology) is mostly meaningful from the IXP vantage point. Workload and Metrics. For each ALTO client (h1, h2, h3), we run end-to-end round-trip time measurements and available bandwidth with the remaining nine hosts using ping 17 and iperf 18 tools, respectively. The main idea behind this workload is to emulate a client application (each host) trying to connect with candidate (one of nine possible) peer applications / content servers based on a random selection, and then, compare the obtained bandwidth and latency if the client had use the ALTO information to perform better-thanrandom peer selection through the use of the ALTO Cost Map ranking. We consider both an ideal scenario without traffic as well as another with a background traffic using the D-ITG traffic generator with randomly selected source and destination pairs send TCP traffic (512 byte packet size, 1,000 pps rate). Results Analysis. Overall, the results are encouraging as one may expect from applications being able to choose destination peers using ALTO information instead of a random peer selection. Applications with built-in module to evaluate the network performance from/to each candidate peer would correspond to the optimal choice from the application point of view. However, this may not be the best one regarding the network operator policies (e.g., avoid transit costs) and certainly not the simplest (extra code needed per based on AS-Path Summary files extracted from a LGs. Source code available at: 17 Average Round-trip time (ms) of 30 pings is computed. 18 Average TCP throughput (Kbps) in 20 Sec is computed.

12 Normalized Network Latency (%) HopsNumber HopsNumberPTT Normalized Network Bandwidth (%) HopsNumber HopsNumberPTT h1 h2 h3 Hosts (a) Latency using ping h1 h2 h3 Hosts (b) Throughput using iperf Figure 9. Latency and throughput gains (scenario with background traffic) of h1, h2 and h3 using AaaS Cost Map ranking based on an absolute distance (HopsNumber) and relative distance (HopsNumberPTT) metrics compared to random peer selection. application) nor the quickest method (the application needs to assess all candidate destination IPs prior to connection setup). Figure 9 shows the normalized latency and bandwidth (as box plots with mean, quartiles, and max/min values) that an ALTO client would obtain when using the Cost Map ranking compared to a random selection approach (average values of 8 samples is used as baseline) in a scenario with background traffic. Without traffic, results are also positive, more expressive in terms of latency gains (see Table 4) compared to throughput improvements. Results show an improvement in latency (Fig. 9(a)) and throughput (Fig. 9(b)) of up to 29% could be achieved. In some cases, peers selected through AaaS may end up with slower bandwidth or higher latency (between 1% and 11%). This means that while reducing the total number of AS hops could result in significant performance improvements, shortest paths in the Internet are not always the best (e.g., due to congestion). However, this under-performance represents, on average, less than 25 percent of all cases. A comparison of performance between two proposed maps (Fig. 8, Cost Map Rankings) is also considered. For example, the Cost Map based on absolute distance (HopsNumber) suggests h3 (AS3) to seek out h5 (AS5), while the Cost Map based on relative distance (HopsNumberPTT) informs h3 (AS3) to connect to h1 (AS1). In both cases, performance improvements above 20% (latency and throughput) are obtained, yet when h3 uses the IXP infrastructure to select a peer (h1), as HopsNumberPTT suggests, further throughput improvements (up to 26%) and lower latency (up to 24%) can be obtained. 6. Related Work The work in [Khan et al. 2013] shows that it is possible to build the current view of the Internet AS-level topology from the BGP route announcement of AS by using the LG servers. The authors collected raw data from 245 LG servers across 110 countries and build the AS topology. The main lesson learned is that LG-based methods are less error prone than traditional traceroute-based ones, allowing raw data collection and building the AS topology more reliable.

13 Table 4. Network Latency (ms) in a scenario with no traffic expressed as RTT AVG and ±RTT MDEV. h1 h2 h3 h4 h5 h6 h7 h8 h9 h10 h (±0.4) h2 h (±0.3) (±0.4) (±0.3) (±0.2) (±0.5) (±0.5) (±0.4) (±0.6) (±0.5) (±0.4) (±0.4) (±0.7) (±0.3) (±0.5) (±0.5) (±0.6) (±0.4) (±0.8) (±0.7) (±0.5) (±0.8) (±0.8) (±0.4) (±1.0) (±0.6) (±0.8) As shown in Fig. 2(a), the ALTO architecture allows for external interfaces, so that third-parties may feed an ALTO server. The work in [Gurbani et al. 2014] demonstrates how outside parties can create network topology and cost maps for ALTO from public sources of information, specifically using the United States Federal Communications Commission (FCC) public database from the Measuring Broadband America (MBA) program. Similar efforts, e.g., [Pinthong and Lilakiatsakun 2013, Guanxiu et al. 2013] explore the ALTO protocol when mapping IP addresses to an AS to create a network map and BGP route announcements to create a cost. In the context of P2P, n-tracker [Shibuya et al. 2011] has been proposed as an ISP-friendly approach based on an ALTO-like server to determine the ranking of candidate peers. Others P2P solutions ([Choffnes and Bustamante 2008, Xie et al. 2007]) provide a reliable network topology information to apply better-than-random peer selection, but not in the form of ALTO services. 7. Conclusions and Future Work To the best of our knowledge, this is the first work that explores the use of inter-domain routing data publicly available at IXPs to create abstract topology and cost maps following the recently standardized IETF ALTO protocol. Our proof-of-concept implementation is based on the popular Neo4j graph database and the OpenDaylight controller and validated the potential of applications (e.g., P2P clients or trackers, CDNs, SDN controllers) to leverage the network awareness provided by ALTO servers to optimize their decisionmaking regarding IP endpoint selection resulting better user experience. At the same time, ISPs and ALTO service providers (in our case IX.br operators) can benefit from increased, localized IXP traffic exchange. Our win-win proposal referred to as ALTO-as-a-Service is not free of limitations and there is a challenging amount of future work. Firstly, the AaaS workflow does not handle periodic updates (e.g. when a new dataset is retrieved) and, our Cost Map rankings are based only on relatively static AS-Path distance and do not consider more dynamic information such as actual bandwidth, latency, packet loss rate, etc. Thus, dynamic updates of cost maps based on public Internet quality measurements (e.g., SIMET Traffic Measurement System, RIPE TTM) are at the top of our research agenda. It is important to stress that while the ALTO protocol may provide dynamic network information, it is not intended to replace near-real-time congestion control protocols [Alimi et al. 2014]. In addition, solutions to potential resource saturation problems are being considered as future work activities, such as ALTO servers replying with round robin chosen versions

14 of the maps for equal cost paths to reduce the chances of multiple clients all choosing the same best destinations at once. The intersection of ALTO with SDN-controlled domains are also an avenue of ongoing investigation as a means to facilitate inter-domain traffic engineering and SDN east/west interfaces. Implementing the remaining ALTO services (e.g., full Map-Service, EPS and ECS) is another open task, which adds to a number of performance optimization opportunities of our prototype, most of them related to Neo4j query tuning techniques (e.g., DB indexes, heap size, garbage collection and Linux fs configuration). References Alimi, R., Penno, R., Yang, Y., Kiesel, S., Previdi, S., Roome, W., Shalunov, S., and Woundy, R. (2014). Application-Layer Traffic Optimization (ALTO) Protocol. RFC Brito, S., Santos, M., Fontes, R., Lachos, D., and Rothenberg, C. (2015). Anatomia do Ecossistema de Pontos de Troca de Tráfego Publicos na Internet do Brasil. In XXXIII Simpósio Brasileiro de Redes de Computadores (SBRC). Vitória, ES, Brazil. Choffnes, D. R. and Bustamante, F. E. (2008). Taming the torrent: a practical approach to reducing cross-isp traffic in peer-to-peer systems. In ACM SIGCOMM Computer Communication Review, volume 38, pages ACM. Guanxiu, L., Suqi, Y., and Xinli, H. (2013). A Novel ALTO Scheme for BitTorrent-Like P2P File Sharing Systems. In Proceedings of the 2013 Third International Conference on Intelligent System Design and Engineering Applications. Gurbani, V., Goergen, D., State, R., and Engel, T. (2014). Making historical connections: Building Application Layer Traffic Optimization (ALTO) network and cost maps from public broadband data. In Network and Service Management (CNSM), th International Conference on. Khan, A., Kwon, T., Kim, H.-c., and Choi, Y. (2013). AS-level Topology Collection Through Looking Glass Servers. In Proceedings of the 2013 Conference on Internet Measurement Conference, IMC 13, pages , New York, NY, USA. ACM. Madhukar, A. and Williamson, C. (2006). A longitudinal study of p2p traffic classification. In Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), pages Neo4j (2015). The Neo4j Manual v2.3.0-m03. Pinthong, N. and Lilakiatsakun, W. (2013). Performance of BitTorrent-like P2P file sharing systems inspired by ALTO. In TENCON IEEE Region 10 Conference (31194). Seedorf, J. and Burger, E. (2009). Application-Layer Traffic Optimization (ALTO) Problem Statement. RFC Shibuya, M., Hei, Y., and Ogishi, T. (2011). ISP-friendly peer selection mechanism with ALTO-like server. In Network Operations and Management Symposium (APNOMS). Xie, H., Krishnamurthy, A., Silberschatz, A., and Yang, Y. R. (2007). P4p: explicit communications for cooperative control between p2p and network providers. P4PWG Whitepaper, pages 1 7.

ALTO-based Broker-assisted Multi-domain Orchestration - 00

ALTO-based Broker-assisted Multi-domain Orchestration - 00 IETF 101 - ALTO WG ALTO-based Broker-assisted Multi-domain Orchestration - 00 Danny Alex Lachos Perez Christian Esteve Rothenberg (University of Campinas, Brazil) @ http://intrig.dca.fee.unicamp.br Agenda

More information

A Survey on Research on the Application-Layer Traffic Optimization (ALTO) Problem

A Survey on Research on the Application-Layer Traffic Optimization (ALTO) Problem A Survey on Research on the Application-Layer Traffic Optimization (ALTO) Problem draft-rimac-p2prg-alto-survey-00 Marco Tomsu, Ivica Rimac, Volker Hilt, Vijay Gurbani, Enrico Marocco 75 th IETF Meeting,

More information

PERISCOPE: Standardizing and Orchestrating Looking Glass Querying

PERISCOPE: Standardizing and Orchestrating Looking Glass Querying PERISCOPE: Standardizing and Orchestrating Looking Glass Querying Vasileios Giotsas UCSD/CAIDA vgiotsas@caida.org NANOG 68, October 17-19 2016, Dallas, TX Purpose of this Talk Inform the operational community

More information

A Novel ALTO Scheme for BitTorrent-Like P2P File Sharing Systems

A Novel ALTO Scheme for BitTorrent-Like P2P File Sharing Systems 2013 Third International Conference on Intelligent System Design and Engineering Applications A Novel ALTO Scheme for BitTorrent-Like P2P File Sharing Systems Liu Guanxiu, Ye Suqi, Huang Xinli Department

More information

Evaluating Application-Layer Traffic Optimization Cost Metrics for P2P Multimedia Streaming

Evaluating Application-Layer Traffic Optimization Cost Metrics for P2P Multimedia Streaming Downloaded from orbit.dtu.dk on: Feb 07, 2018 Evaluating Application-Layer Traffic Optimization Cost Metrics for P2P Multimedia Streaming Poderys, Justas; Soler, José Published in: Proceedings of 25th

More information

Design and development of the reactive BGP peering in softwaredefined routing exchanges

Design and development of the reactive BGP peering in softwaredefined routing exchanges Design and development of the reactive BGP peering in softwaredefined routing exchanges LECTURER: HAO-PING LIU ADVISOR: CHU-SING YANG (Email: alen6516@gmail.com) 1 Introduction Traditional network devices

More information

Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing

Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Virtual Multi-homing: On the Feasibility of Combining Overlay Routing with BGP Routing Zhi Li, Prasant Mohapatra, and Chen-Nee Chuah University of California, Davis, CA 95616, USA {lizhi, prasant}@cs.ucdavis.edu,

More information

Application Layer Traffic Optimization (ALTO)

Application Layer Traffic Optimization (ALTO) Application Layer Traffic Optimization (ALTO) Network Positioning System Stefano Previdi - sprevidi@cisco.com Distinguished Engineer Cisco Systems RIPE61 Rome, November 2010 1 Cisco NPS Introduction NPS

More information

Communication System Design Projects

Communication System Design Projects Communication System Design Projects KUNGLIGA TEKNISKA HÖGSKOLAN PROFESSOR: DEJAN KOSTIC TEACHING ASSISTANT: GEORGIOS KATSIKAS Traditional Vs. Modern Network Management What is Network Management (NM)?

More information

Dissecting the Largest National Ecosystem of Public Internet exchange Points in Brazil

Dissecting the Largest National Ecosystem of Public Internet exchange Points in Brazil Dissecting the Largest National Ecosystem of Public Internet exchange Points in Brazil Samuel Henrique Bucke Brito, Mateus A. S. Santos, Ramon dos Reis Fontes, Danny A. Lachos Perez, and Christian Esteve

More information

Drafting Behind Akamai (Travelocity-Based Detouring)

Drafting Behind Akamai (Travelocity-Based Detouring) (Travelocity-Based Detouring) Ao-Jan Su, David R. Choffnes, Aleksandar Kuzmanovic and Fabián E. Bustamante Department of EECS Northwestern University ACM SIGCOMM 2006 Drafting Detour 2 Motivation Growing

More information

Network Forensics Prefix Hijacking Theory Prefix Hijacking Forensics Concluding Remarks. Network Forensics:

Network Forensics Prefix Hijacking Theory Prefix Hijacking Forensics Concluding Remarks. Network Forensics: Network Forensics: Network OS Fingerprinting Prefix Hijacking Analysis Scott Hand September 30 th, 2011 Outline 1 Network Forensics Introduction OS Fingerprinting 2 Prefix Hijacking Theory BGP Background

More information

Computer Science 461 Final Exam May 22, :30-3:30pm

Computer Science 461 Final Exam May 22, :30-3:30pm NAME: Login name: Computer Science 461 Final Exam May 22, 2012 1:30-3:30pm This test has seven (7) questions, each worth ten points. Put your name on every page, and write out and sign the Honor Code pledge

More information

Routing Basics ISP/IXP Workshops

Routing Basics ISP/IXP Workshops Routing Basics ISP/IXP Workshops 1 Routing Concepts IPv4 Routing Forwarding Some definitions Policy options Routing Protocols 2 IPv4 Internet uses IPv4 addresses are 32 bits long range from 1.0.0.0 to

More information

Peering at Peerings: On the Role of IXP Route Servers

Peering at Peerings: On the Role of IXP Route Servers Peering at Peerings: On the Role of IXP Route Servers Contact: Philipp Richter (prichter@inet.tu-berlin.de) Paper: net.t-labs.tu-berlin.de/~prichter/imc238-richtera.pdf Philipp Richter TU Berlin Nikolaos

More information

Network Working Group

Network Working Group Network Working Group Internet-Draft Intended status: Experimental Expires: January 13, 2011 R. Penno S. Raghunath J. Medved M. Bakshi Juniper Networks R. Alimi Yale University S. Previdi Cisco Systems

More information

Delay Controlled Elephant Flow Rerouting in Software Defined Network

Delay Controlled Elephant Flow Rerouting in Software Defined Network 1st International Conference on Advanced Information Technologies (ICAIT), Nov. 1-2, 2017, Yangon, Myanmar Delay Controlled Elephant Flow Rerouting in Software Defined Network Hnin Thiri Zaw, Aung Htein

More information

An overview on Internet Measurement Methodologies, Techniques and Tools

An overview on Internet Measurement Methodologies, Techniques and Tools An overview on Internet Measurement Methodologies, Techniques and Tools AA 2011/2012 emiliano.casalicchio@uniroma2.it (Agenda) Lezione 2/05/2012 Part 1 Intro basic concepts ISP Traffic exchange (peering)

More information

Routing Basics. ISP Workshops. Last updated 10 th December 2015

Routing Basics. ISP Workshops. Last updated 10 th December 2015 Routing Basics ISP Workshops Last updated 10 th December 2015 1 Routing Concepts p IPv4 & IPv6 p Routing p Forwarding p Some definitions p Policy options p Routing Protocols 2 IPv4 p Internet still uses

More information

Background Brief. The need to foster the IXPs ecosystem in the Arab region

Background Brief. The need to foster the IXPs ecosystem in the Arab region Background Brief The need to foster the IXPs ecosystem in the Arab region The Internet has become a shared global public medium that is driving social and economic development worldwide. Its distributed

More information

Shim6: Network Operator Concerns. Jason Schiller Senior Internet Network Engineer IP Core Infrastructure Engineering UUNET / MCI

Shim6: Network Operator Concerns. Jason Schiller Senior Internet Network Engineer IP Core Infrastructure Engineering UUNET / MCI Shim6: Network Operator Concerns Jason Schiller Senior Internet Network Engineer IP Core Infrastructure Engineering UUNET / MCI Not Currently Supporting IPv6? Many parties are going forward with IPv6 Japan

More information

Routing Basics. Routing Concepts. IPv4. IPv4 address format. A day in a life of a router. What does a router do? IPv4 Routing

Routing Basics. Routing Concepts. IPv4. IPv4 address format. A day in a life of a router. What does a router do? IPv4 Routing Routing Concepts IPv4 Routing Routing Basics ISP/IXP Workshops Forwarding Some definitions Policy options Routing Protocols 1 2 IPv4 IPv4 address format Internet uses IPv4 addresses are 32 bits long range

More information

RIPE Labs Operator Tools, Ideas, Analysis

RIPE Labs Operator Tools, Ideas, Analysis RIPE Labs Operator Tools, Ideas, Analysis AMS-IX Meeting, Amsterdam, 16 Nov. 2011 Mirjam Kühne, RIPE NCC A Bit of History RIPE NCC started as the coordination centre for the RIPE community - RIPE Database,

More information

SDN Use-Cases. internet exchange, home networks. TELE4642: Week8. Materials from Prof. Nick Feamster is gratefully acknowledged

SDN Use-Cases. internet exchange, home networks. TELE4642: Week8. Materials from Prof. Nick Feamster is gratefully acknowledged SDN Use-Cases internet exchange, home networks TELE4642: Week8 Materials from Prof. Nick Feamster is gratefully acknowledged Overview n SDX: A Software-Defined Internet Exchange n SDN-enabled Home Networks

More information

Shortcuts through Colocation Facilities

Shortcuts through Colocation Facilities Shortcuts through Colocation Facilities Vasileios Kotronis1, George Nomikos1, Lefteris Manassakis1, Dimitris Mavrommatis1 and Xenofontas Dimitropoulos1,2 1 Foundation for Research and Technology - Hellas

More information

Background Brief. The need to foster the IXPs ecosystem in the Arab region

Background Brief. The need to foster the IXPs ecosystem in the Arab region Background Brief The need to foster the IXPs ecosystem in the Arab region The Internet has become a shared global public medium that is driving social and economic development worldwide. Its distributed

More information

Lecture 19: Network Layer Routing in the Internet

Lecture 19: Network Layer Routing in the Internet Lecture 19: Network Layer Routing in the Internet COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016, J.F

More information

The Internet Ecosystem

The Internet Ecosystem The Internet Ecosystem How does the Internet really work? Alvaro Retana (aretana@cisco.com) Distinguished Engineer, Cisco Services Original Slides with Russ White (russ@riw.us) The Net What are the protocols

More information

Understanding the effect of streaming overlay construction on AS level traffic

Understanding the effect of streaming overlay construction on AS level traffic Understanding the effect of streaming overlay construction on AS level traffic Reza Motamedi and Reza Rejaie Information and Computer Science Department University of Oregon e-mail: {reza.motamedi,reza}@cs.uoregon.edu

More information

A framework to evaluate 5G networks for smart and fail-safe communications

A framework to evaluate 5G networks for smart and fail-safe communications A framework to evaluate 5G networks for smart and fail-safe communications in ERTMS/ETCS Roberto Canonico (*), Stefano Marrone (**), Roberto Nardone (*), and Valeria Vittorini (*) (*) Università degli

More information

Routing Concepts. IPv4 Routing Forwarding Some definitions Policy options Routing Protocols

Routing Concepts. IPv4 Routing Forwarding Some definitions Policy options Routing Protocols Routing Basics 1 Routing Concepts IPv4 Routing Forwarding Some definitions Policy options Routing Protocols 2 IPv4 Internet uses IPv4 Addresses are 32 bits long Range from 1.0.0.0 to 223.255.255.255 0.0.0.0

More information

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4 CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication

More information

Trisul Network Analytics - Traffic Analyzer

Trisul Network Analytics - Traffic Analyzer Trisul Network Analytics - Traffic Analyzer Using this information the Trisul Network Analytics Netfllow for ISP solution provides information to assist the following operation groups: Network Operations

More information

Routing Basics. ISP Workshops

Routing Basics. ISP Workshops Routing Basics ISP Workshops These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/) Last updated 26

More information

Tracing the Path to YouTube -

Tracing the Path to YouTube - Tracing the Path to YouTube - A Quantification of Path Lengths and Latencies towards Accepted for publication in IEEE Communications Magazine (Pre-print: http://in.tum.de/~doan/2018-yt-traces.pdf) Trinh

More information

ISP-Aided Neighbor Selection for P2P Systems

ISP-Aided Neighbor Selection for P2P Systems ISP-Aided Neighbor Selection for P2P Systems Anja Feldmann Vinay Aggarwal, Obi Akonjang, Christian Scheideler (TUM) Deutsche Telekom Laboratories TU-Berlin 1 P2P traffic

More information

Dissemination of Paths in Path-Aware Networks

Dissemination of Paths in Path-Aware Networks Dissemination of Paths in Path-Aware Networks Christos Pappas Network Security Group, ETH Zurich IETF, November 16, 2017 PANRG Motivation How does path-awareness extend to the edge? 2 PANRG Motivation

More information

EXAM TCP/IP NETWORKING Duration: 3 hours With Solutions

EXAM TCP/IP NETWORKING Duration: 3 hours With Solutions SCIPER: First name: Family name: EXAM TCP/IP NETWORKING Duration: 3 hours With Solutions Jean-Yves Le Boudec January 2016 INSTRUCTIONS 1. Write your solution into this document and return it to us (you

More information

EXAM TCP/IP NETWORKING Duration: 3 hours With Solutions

EXAM TCP/IP NETWORKING Duration: 3 hours With Solutions SCIPER: First name: Family name: EXAM TCP/IP NETWORKING Duration: 3 hours With Solutions Jean-Yves Le Boudec January 2013 INSTRUCTIONS 1. Write your solution into this document and return it to us (you

More information

Factors Affecting Performance of Web Flows in Cellular Networks

Factors Affecting Performance of Web Flows in Cellular Networks in Cellular Networks Ermias A. Walelgne, Kim Setälä, Vaibhav Bajpai, Stefan Neumeier, Jukka Manner, Jörg Ott October 17, 2018 - RIPE 77, Amsterdam Introduction Introduction Introduction Motivation 99%

More information

Avaya ExpertNet Lite Assessment Tool

Avaya ExpertNet Lite Assessment Tool IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...

More information

Proceedings of the Fourth Engineering Students Conference at Peradeniya (ESCaPe) SDN Flow Caching

Proceedings of the Fourth Engineering Students Conference at Peradeniya (ESCaPe) SDN Flow Caching Proceedings of the Fourth Engineering Students Conference at Peradeniya (ESCaPe) 2016 SDN Flow Caching N.B.U.S. Nanayakkara, R.M.L.S. Bandara, N.B. Weerasinghe, S,N, Karunarathna Department of Computer

More information

Making historical connections: Building Application Layer Traffic Optimization (ALTO) network and cost maps from public broadband data

Making historical connections: Building Application Layer Traffic Optimization (ALTO) network and cost maps from public broadband data Making historical connections: Building Application Layer Traffic Optimization (ALTO) network and cost maps from public broadband data Vijay K. Gurbani Bell Laboratories, Alcatel-Lucent Email: vijay.gurbani@alcatel-lucent.com

More information

A Policy Controlled IPv4/IPv6 Network Emulation Environment

A Policy Controlled IPv4/IPv6 Network Emulation Environment A Policy Controlled IPv4/IPv6 Network Emulation Environment Tomislav Grgic and Maja Matijasevic University of Zagreb, Faculty of Electrical Engineering and Computing Unska 3, HR-10000 Zagreb, Croatia tomislav.grgic@fer.hr,

More information

Storage Networking Strategy for the Next Five Years

Storage Networking Strategy for the Next Five Years White Paper Storage Networking Strategy for the Next Five Years 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 8 Top considerations for storage

More information

On Feasibility of P2P Traffic Control through Network Performance Manipulation

On Feasibility of P2P Traffic Control through Network Performance Manipulation THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE On Feasibility of P2P Traffic Control through Network Performance Manipulation HyunYong Lee Masahiro Yoshida

More information

CSC 4900 Computer Networks: Routing Protocols

CSC 4900 Computer Networks: Routing Protocols CSC 4900 Computer Networks: Routing Protocols Professor Henry Carter Fall 2017 Last Time Link State (LS) versus Distance Vector (DV) algorithms: What are some of the differences? What is an AS? Why do

More information

PNDA.io: when BGP meets Big-Data

PNDA.io: when BGP meets Big-Data PNDA.io: when BGP meets Big-Data Let s go back in time 26 th April 2017 The Internet is very much alive Millions of BGP events occurring every day 15 Routers Monitored 410 active peers (both IPv4 and IPv6)

More information

Update from the RIPE NCC

Update from the RIPE NCC Update from the RIPE NCC INEX Meeting, Dublin, 14 December 2011 Mirjam Kühne, RIPE NCC Outline RIPE Labs - Background, Purpose, Content, Participation IPv6 Activities and Statistics RIPE Atlas RIPEstat

More information

MAPPING PEERING INTERCONNECTIONS TO A FACILITY

MAPPING PEERING INTERCONNECTIONS TO A FACILITY MAPPING PEERING INTERCONNECTIONS TO A FACILITY Vasileios Giotsas 1 Georgios Smaragdakis 2 Bradley Huffaker 1 Matthew Luckie 3 kc claffy 1 vgiotsas@caida.org WIE 2015 1 UCSD/CAIDA 2 MIT/TU Berlin 3 University

More information

BGP Case Studies. ISP Workshops

BGP Case Studies. ISP Workshops BGP Case Studies ISP Workshops These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/) Last updated

More information

On Minimizing Packet Loss Rate and Delay for Mesh-based P2P Streaming Services

On Minimizing Packet Loss Rate and Delay for Mesh-based P2P Streaming Services On Minimizing Packet Loss Rate and Delay for Mesh-based P2P Streaming Services Zhiyong Liu, CATR Prof. Zhili Sun, UniS Dr. Dan He, UniS Denian Shi, CATR Agenda Introduction Background Problem Statement

More information

Achieving scale: Large scale active measurements from PlanetLab

Achieving scale: Large scale active measurements from PlanetLab Achieving scale: Large scale active measurements from PlanetLab Marc-Olivier Buob, Jordan Augé (UPMC) 4th PhD School on Traffic Monitoring and Analysis (TMA) April 15th, 2014 London, UK OneLab FUTURE INTERNET

More information

MPLS L3VPN. The MPLS L3VPN model consists of three kinds of devices: PE CE Site 2. Figure 1 Network diagram for MPLS L3VPN model

MPLS L3VPN. The MPLS L3VPN model consists of three kinds of devices: PE CE Site 2. Figure 1 Network diagram for MPLS L3VPN model is a kind of PE-based L3VPN technology for service provider VPN solutions. It uses BGP to advertise VPN routes and uses to forward VPN packets on service provider backbones. provides flexible networking

More information

Da t e: August 2 0 th a t 9: :00 SOLUTIONS

Da t e: August 2 0 th a t 9: :00 SOLUTIONS Interne t working, Examina tion 2G1 3 0 5 Da t e: August 2 0 th 2 0 0 3 a t 9: 0 0 1 3:00 SOLUTIONS 1. General (5p) a) Place each of the following protocols in the correct TCP/IP layer (Application, Transport,

More information

Network Performance Analysis of an Adaptive OSPF Routing Strategy Effective Bandwidth Estimation

Network Performance Analysis of an Adaptive OSPF Routing Strategy Effective Bandwidth Estimation International Telecommunication Symposium ITS 22, Natal, Brazil Network Performance Analysis of an Adaptive OSPF Routing Strategy Effective Bandwidth Estimation Tatiana B. Pereira and Lee L. Ling UNICAMP,

More information

DEVOPSIFYING NETWORK SECURITY. An AlgoSec Technical Whitepaper

DEVOPSIFYING NETWORK SECURITY. An AlgoSec Technical Whitepaper DEVOPSIFYING NETWORK SECURITY An AlgoSec Technical Whitepaper Introduction This technical whitepaper presents and discusses the concept of Connectivity as Code, a complementary concept to Infrastructure

More information

Design of Next Generation Internet Based on Application-Oriented Networking

Design of Next Generation Internet Based on Application-Oriented Networking Design of Next Generation Internet Based on Application-Oriented Networking Yu Cheng Department of Electrical and Computer Engineering Illinois Institute of Technology Chicago, Illinois, USA cheng@iit.edu

More information

Collaborative Verification of Forward and Reverse Reachability in the Internet Data Plane

Collaborative Verification of Forward and Reverse Reachability in the Internet Data Plane 204 IEEE 22nd International Conference on Network Protocols Collaborative Verification of Forward and Reverse Reachability in the Internet Data Plane Hongkun Yang and Simon S. Lam Department of Computer

More information

Multicast Technology White Paper

Multicast Technology White Paper Multicast Technology White Paper Keywords: Multicast, IGMP, IGMP Snooping, PIM, MBGP, MSDP, and SSM Mapping Abstract: The multicast technology implements high-efficiency point-to-multipoint data transmission

More information

DailyCatch: A Provider-centric View of Anycast Behaviour

DailyCatch: A Provider-centric View of Anycast Behaviour DailyCatch: A Provider-centric View of Anycast Behaviour Stephen McQuistin University of Glasgow Sree Priyanka Uppu Marcel Flores Verizon Digital Media Services What is IP anycast? 2 What is IP anycast?

More information

Internet Measurements. Motivation

Internet Measurements. Motivation Internet Measurements Arvind Krishnamurthy Fall 2004 Motivation Types of measurements Understand the topology of the Internet Measure performance characteristics Tools: BGP Tables Traceroute measurements

More information

Flow Analyzer 1.0 Help Guide FLOW ANALYZER 1.0. By Nuviso

Flow Analyzer 1.0 Help Guide FLOW ANALYZER 1.0. By Nuviso FLOW ANALYZER 1.0 By Nuviso 1 CONTENTS Overview... 3 Flow Correlation... 3 Alternate/Optimal Path... 4 Optimal path based on least Hops... 4 Optimal path based on least Latency... 4 Optimal path based

More information

MAPPING PEERING INTERCONNECTIONS TO A FACILITY

MAPPING PEERING INTERCONNECTIONS TO A FACILITY MAPPING PEERING INTERCONNECTIONS TO A FACILITY Vasileios Giotsas 1 Georgios Smaragdakis 2 Bradley Huffaker 1 Matthew Luckie 3 kc claffy 1 vgiotsas@caida.org CoNEXT 2015 1 UCSD/CAIDA 2 MIT/TU Berlin 3 University

More information

CS 640: Introduction to Computer Networks. Intra-domain routing. Inter-domain Routing: Hierarchy. Aditya Akella

CS 640: Introduction to Computer Networks. Intra-domain routing. Inter-domain Routing: Hierarchy. Aditya Akella CS 640: Introduction to Computer Networks Aditya Akella Lecture 11 - Inter-Domain Routing - BGP (Border Gateway Protocol) Intra-domain routing The Story So Far Routing protocols generate the forwarding

More information

Small additions by Dr. Enis Karaarslan, Purdue - Aaron Jarvis (Network Engineer)

Small additions by Dr. Enis Karaarslan, Purdue - Aaron Jarvis (Network Engineer) Routing Basics 1 Small additions by Dr. Enis Karaarslan, 2014 Purdue - Aaron Jarvis (Network Engineer) Routing Concepts IPv4 Routing Forwarding Some definitions Policy options Routing Protocols 3 IPv4

More information

Technical Requirements Policy for IX.br - V1.0

Technical Requirements Policy for IX.br - V1.0 - V1.0 An Internet Exchange Point (IXP or IX) is a network solution typically consisting of switches and routers operating at the layer 2 level of the ISO/OSI reference model, which offers a range of services

More information

Networking: Network layer

Networking: Network layer control Networking: Network layer Comp Sci 3600 Security Outline control 1 2 control 3 4 5 Network layer control Outline control 1 2 control 3 4 5 Network layer purpose: control Role of the network layer

More information

Cisco Extensible Network Controller

Cisco Extensible Network Controller Data Sheet Cisco Extensible Network Controller Product Overview Today s resource intensive applications are making the network traffic grow exponentially putting high demands on the existing network. Companies

More information

Routing Basics ISP/IXP Workshops

Routing Basics ISP/IXP Workshops Routing Basics ISP/IXP Workshops 1 Routing Concepts IPv4 Routing Forwarding Some definitions Policy options Routing Protocols 2 IPv4 Internet uses IPv4 addresses are 32 bits long range from 1.0.0.0 to

More information

Available online at ScienceDirect. Procedia Computer Science 34 (2014 )

Available online at   ScienceDirect. Procedia Computer Science 34 (2014 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 34 (2014 ) 680 685 International Workshop on Software Defined Networks for a New Generation of Applications and Services

More information

PatternRank: A Software-Pattern Search System Based on Mutual Reference Importance

PatternRank: A Software-Pattern Search System Based on Mutual Reference Importance PatternRank: A Software-Pattern Search System Based on Mutual Reference Importance Atsuto Kubo, Hiroyuki Nakayama, Hironori Washizaki, Yoshiaki Fukazawa Waseda University Department of Computer Science

More information

Introduction. Routing & Addressing: Multihoming 10/25/04. The two SIGCOMM papers. A Comparison of Overlay Routing and Multihoming Route Control

Introduction. Routing & Addressing: Multihoming 10/25/04. The two SIGCOMM papers. A Comparison of Overlay Routing and Multihoming Route Control Introduction Routing & Addressing: Multihoming 10/25/04 Hong Tat Tong Two attempts to control/ensure best performance over the Internet Multihoming from the endpoints Overlay with some help from middle-boxes

More information

Design and Implementation of A P2P Cooperative Proxy Cache System

Design and Implementation of A P2P Cooperative Proxy Cache System Design and Implementation of A PP Cooperative Proxy Cache System James Z. Wang Vipul Bhulawala Department of Computer Science Clemson University, Box 40974 Clemson, SC 94-0974, USA +1-84--778 {jzwang,

More information

Defining the Impact of the Edge Using The SamKnows Internet Measurement Platform. PREPARED FOR EdgeConneX

Defining the Impact of the Edge Using The SamKnows Internet Measurement Platform. PREPARED FOR EdgeConneX Defining the Impact of the Edge Using The SamKnows Internet Measurement Platform PREPARED FOR EdgeConneX Contents 1 EXECUTIVE SUMMARY 3 1.1 About EdgeConneX 3 1.2 About SamKnows 4 2 INTRODUCTION 5 2.1

More information

NaMeX Route Server HOWTO

NaMeX Route Server HOWTO NaMeX Route Server HOWTO June 24, 2010 1 Service overview Route servers (RS) are a value-added service that can be offered by IXPs. Actually, the availability of a RS within an IXP is becoming more and

More information

Random Neural Networks for the Adaptive Control of Packet Networks

Random Neural Networks for the Adaptive Control of Packet Networks Random Neural Networks for the Adaptive Control of Packet Networks Michael Gellman and Peixiang Liu Dept. of Electrical & Electronic Eng., Imperial College London {m.gellman,p.liu}@imperial.ac.uk Abstract.

More information

How Akamai delivers your packets - the insight. Christian Kaufmann SwiNOG #21 11th Nov 2010

How Akamai delivers your packets - the insight. Christian Kaufmann SwiNOG #21 11th Nov 2010 How Akamai delivers your packets - the insight Christian Kaufmann SwiNOG #21 11th Nov 2010 What is a Content Distribution Network? The RFCs and Internet Drafts define a Content Distribution Network, CDN,

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Network Layer ICMP (5.6), Network Management(5.7) & SDN (5.1, 5.5, 4.4) Prof. Lina Battestilli Fall 2017 Outline 5.6 ICMP: The Internet Control Message

More information

IPv6 Transition Technologies (TechRef)

IPv6 Transition Technologies (TechRef) Tomado de: http://technet.microsoft.com/en-us/library/dd379548.aspx IPv6 Transition Technologies (TechRef) Updated: January 7, 2009 IPv6 Transition Technologies Protocol transitions are not easy, and the

More information

SaaS Providers. ThousandEyes for. Summary

SaaS Providers. ThousandEyes for. Summary USE CASE ThousandEyes for SaaS Providers Summary With Software-as-a-Service (SaaS) applications rapidly replacing onpremise solutions, the onus of ensuring a great user experience for these applications

More information

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing Last time Network layer Introduction forwarding vs. routing Virtual circuit vs. datagram details connection setup, teardown VC# switching forwarding tables, longest prefix matching IP: the Internet Protocol

More information

EXAM TCP/IP NETWORKING Duration: 3 hours

EXAM TCP/IP NETWORKING Duration: 3 hours SCIPER: First name: Family name: EXAM TCP/IP NETWORKING Duration: 3 hours Jean-Yves Le Boudec January 2013 INSTRUCTIONS 1. Write your solution into this document and return it to us (you do not need to

More information

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs Jin Liu 1, Hongmin Ren 1, Jun Wang 2, Jin Wang 2 1 College of Information Engineering, Shanghai Maritime University,

More information

APPLICATION OF POLICY BASED INDEXES AND UNIFIED CACHING FOR CONTENT DELIVERY Andrey Kisel Alcatel-Lucent

APPLICATION OF POLICY BASED INDEXES AND UNIFIED CACHING FOR CONTENT DELIVERY Andrey Kisel Alcatel-Lucent APPLICATION OF POLICY BASED INDEXES AND UNIFIED CACHING FOR CONTENT DELIVERY Andrey Kisel Alcatel-Lucent Abstract Caching technologies are used to improve quality of experience while controlling transit

More information

A Hybrid Hierarchical Control Plane for Software-Defined Network

A Hybrid Hierarchical Control Plane for Software-Defined Network A Hybrid Hierarchical Control Plane for Software-Defined Network Arpitha T 1, Usha K Patil 2 1* MTech Student, Computer Science & Engineering, GSSSIETW, Mysuru, India 2* Assistant Professor, Dept of CSE,

More information

Service Provider Multihoming

Service Provider Multihoming Service Provider Multihoming ISP Workshops Last updated 18 September 2013 1 Service Provider Multihoming p Previous examples dealt with loadsharing inbound traffic n Of primary concern at Internet edge

More information

Internet Architecture and Experimentation

Internet Architecture and Experimentation Internet Architecture and Experimentation Today l Internet architecture l Principles l Experimentation A packet switched network Modern comm. networks are packet switched Data broken into packets, packet

More information

A Framework for Fine-Grained Inter-Domain Routing Diversity Via SDN

A Framework for Fine-Grained Inter-Domain Routing Diversity Via SDN A Framework for Fine-Grained Inter-Domain Routing Diversity Via SDN Yangyang Wang, Jun Bi, Keyao Zhang Institute for Network Sciences and Cyberspace, Tsinghua University Department of Computer Science,

More information

Service Provider Multihoming

Service Provider Multihoming Service Provider Multihoming ISP Workshops These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/) Last

More information

Software-Defined Networking. Daphné Tuncer Department of Computing Imperial College London (UK)

Software-Defined Networking. Daphné Tuncer Department of Computing Imperial College London (UK) Software-Defined Networking Daphné Tuncer Department of Computing Imperial College London (UK) dtuncer@ic.ac.uk 25/10/2018 Agenda Part I: Principles of Software-Defined Networking (SDN) 1. Why a lecture

More information

Alizadeh, M. et al., " CONGA: distributed congestion-aware load balancing for datacenters," Proc. of ACM SIGCOMM '14, 44(4): , Oct

Alizadeh, M. et al.,  CONGA: distributed congestion-aware load balancing for datacenters, Proc. of ACM SIGCOMM '14, 44(4): , Oct CONGA Paper Review By Buting Ma and Taeju Park Paper Reference Alizadeh, M. et al., " CONGA: distributed congestion-aware load balancing for datacenters," Proc. of ACM SIGCOMM '14, 44(4):503-514, Oct.

More information

Carrier SDN for Multilayer Control

Carrier SDN for Multilayer Control Carrier SDN for Multilayer Control Savings and Services Víctor López Technology Specialist, I+D Chris Liou Vice President, Network Strategy Dirk van den Borne Solution Architect, Packet-Optical Integration

More information

SamKnows test methodology

SamKnows test methodology SamKnows test methodology Download and Upload (TCP) Measures the download and upload speed of the broadband connection in bits per second. The transfer is conducted over one or more concurrent HTTP connections

More information

Infrastructure for Autonomous Mobile Robots Communication and Coordination

Infrastructure for Autonomous Mobile Robots Communication and Coordination 90 Work in Progress Session Infrastructure for Autonomous Mobile Robots Communication and Coordination Marcelo M. Sobral, Leandro B. Becker Dept of Automation and Systems Universidade Federal de Santa

More information

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Kalyan Kalepu, Shiv Mehra and Chansu Yu, Department of Electrical and Computer Engineering Cleveland State University 2121

More information

Pitfalls for ISP-friendly P2P design. Michael Piatek*, Harsha V. Madhyastha, John P. John*, Arvind Krishnamurthy*, Thomas Anderson* *UW, UCSD

Pitfalls for ISP-friendly P2P design. Michael Piatek*, Harsha V. Madhyastha, John P. John*, Arvind Krishnamurthy*, Thomas Anderson* *UW, UCSD Pitfalls for ISP-friendly P2P design Michael Piatek*, Harsha V. Madhyastha, John P. John*, Arvind Krishnamurthy*, Thomas Anderson* *UW, UCSD P2P & ISPs P2P systems: Large volume of traffic (20 80% of total)

More information

Motivation and goal Design concepts and service model Architecture and implementation Performance, and so on...

Motivation and goal Design concepts and service model Architecture and implementation Performance, and so on... Motivation and goal Design concepts and service model Architecture and implementation Performance, and so on... Autonomous applications have a demand for grasping the state of hosts and networks for: sustaining

More information

Inter-Domain Routing with Cut-Through Switching for the MobilityFirst Future Internet Architecture

Inter-Domain Routing with Cut-Through Switching for the MobilityFirst Future Internet Architecture 1 Inter-Domain Routing with Cut-Through Switching for the MobilityFirst Future Internet Architecture Adrian Lara, Shreyasee Mukherjee, Byrav Ramamurthy, Dipankar Raychaudhuri and K. K. Ramakrishnan University

More information

Draft BEREC Guidelines on Net Neutrality and Transparency: Best practices and recommended approaches, October 2011

Draft BEREC Guidelines on Net Neutrality and Transparency: Best practices and recommended approaches, October 2011 Draft BEREC Guidelines on Net Neutrality and Transparency: Best practices and recommended approaches, October 2011 The Internet Society welcomes the opportunity to comment on BEREC s draft Guidelines on

More information